Cyber Attacks
The real system in our experiment comprises four production stations: Pick and place, assembly, muscle compressing and sorting. These modular stations are controlled by Siemens PLC. This is the data gathered from a real manufacturing system and its Digital Twin data when under the denial of service attacks.
- Categories:
This dataset is used to illustrate an application of the "klm-based profiling and preventing security attack (klm-PPSA)" system. The klm-PPSA system is developed to profile, detect, and then prevent known and/or unknown security attacks before a user access a cloud. This dataset was created based on “a.patrik” user logical attempts scenarios when accessing his cloud resources and/or services. You will find attached the CSV file associated with the resulted dataset. The dataset contains 460 records of 13 attributes (independent and dependent variables).
- Categories:
Due to the large number of vulnerabilities in information systems and the continuous activity of attackers, techniques for malicious traffic detection are required to identify and protect against cyber-attacks. Therefore, it is important to intentionally operate a cyber environment to be invaded and compromised in order to allow security professionals to analyze the evolution of the various attacks and exploited vulnerabilities.
This dataset includes 2016, 2017 and 2018 cyber attacks in the HoneySELK environment.
- Categories: